Skip to main content
Log in

A novel secure architecture of the virtualized server system

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

To make cloud computing environments more secure, this paper focuses on the security of virtualized server systems. A security layer is introduced to the secure architecture of a virtualized server as an abstraction. Because the security layer will play a key role in securing the virtualized server, there is a need for it to be sufficiently robust to tackle the most common security threats associated with cloud computing. First, security threats to cloud computing are analysed based on a publication from an international organization and the security issues surrounding virtualized servers are clarified. Following this, the security elements and their functions for each of the security requirements for virtualized servers are defined. The relationship between the security issues and security elements is then presented to verify the effectiveness of the security layer. It is shown that, using the proposed security elements, the security issues facing virtualized server systems in cloud computing are adequately mitigated. Therefore, our research will be helpful in the development of virtualized servers by making cloud computing more secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Amazon Elastic Compute Cloud User Guide [Online] (2014). Available. http://aws.amazon.com. Accessed 5 Feb 2014

  2. The NIST definition of cloud computing (2014). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Accessed 13 Feb 2014

  3. Youseff L, Butrico M, Da Silva D (2008) Toward a unified ontology of cloud computing. In: The grid computing environments workshop, Austin, Texas, 12–16 Nov

  4. Popek GJ, Goldberg RP (1974) Formal requirements for virtualizable third generation architectures. Commun ACM 17(7):412–421

    Article  MathSciNet  MATH  Google Scholar 

  5. Fraser K, Hand S, Neugebauer R, Pratt I, Warfield A, Williams M (2004) Safe hardware access with the Xen virtual machine monitor. In: Proceedings of 1st Workshop Oper. Syst. Architect. Support demand IT InfraStruct. Boston, pp 1–10

  6. Whitaker A, Shaw M, Gribble SD (2002) Denali: lightweight virtual machines for distributed and networked applications. In: Tech. Rep. 02-02-01, Univ. Washington, Seattle

  7. Nakajima J, Lin Q, Yang S, Zhu M, Gao S, Xia M, Yu P, Dong Y, Qi Z, Guan H (2011) Optimizing virtual machines using hybrid virtualization. In: Proceedings of ACM 26th SAC. Taichung, pp 573–578

  8. Dong Y, Zhang X, Dai J, Guan H (2014) HYVI: a hybrid virtualization solution balancing performance and manageability. IEEE Trans Parallel Distrib Syst 25(9):2332–2341

    Article  Google Scholar 

  9. Website (2014) http://www.google.com. Accessed 10 Feb 2014

  10. Website (2014) http://code.google.com/appengine/. Accessed 10 Feb 2014

  11. Website (2014) http://aws.amazon.com. Accessed 5 Feb 2014

  12. Recommendation ITU-T Y.3502 (2014). Information technology—cloud computing—reference architecture

  13. Recommendation ITU-T X.1601 (2014). Security framework for cloud computing

  14. Lee K (2012) Security threats in cloud computing environments. Int J Security Appl 6(4)

  15. Lee C, Kim S, Yeo Y, Moon J (2013) Proposal of security requirements based on layers and roles for the standardization of cloud computing security technology. J Security Eng 10(4)

  16. Cloud Security Alliance (2013) The notorious nine: cloud computing top threats in 2013

  17. European Network and Information Security Agency (2013) Threat landscape 2013

Download references

Acknowledgments

This research was supported by the ICT Standardization program of MSIP (The Ministry of Science, ICT & Future Planning).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongsub Moon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, SK., Ma, SY. & Moon, J. A novel secure architecture of the virtualized server system. J Supercomput 72, 24–37 (2016). https://doi.org/10.1007/s11227-015-1401-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1401-4

Keywords